Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-26496

Опубликовано: 06 мар. 2022
Источник: debian
EPSS Низкий

Описание

In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nbdfixed1:3.24-1package
nbdnot-affectedstretchpackage

Примечания

  • https://lists.debian.org/nbd/2022/01/msg00036.html

  • https://lists.debian.org/nbd/2022/01/msg00037.html

EPSS

Процентиль: 62%
0.00436
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 3 лет назад

In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.

CVSS3: 9.8
nvd
больше 3 лет назад

In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.

CVSS3: 9.8
github
больше 3 лет назад

In nbd-server in nbd before 3.24, there is a stack-based buffer overflow. An attacker can cause a buffer overflow in the parsing of the name field by sending a crafted NBD_OPT_INFO or NBD_OPT_GO message with an large value as the length of the name.

CVSS3: 9.8
fstec
около 3 лет назад

Уязвимость реализации сетевых блочных устройств nbd, связанная с переполнением буфера в стека, позволяющая нарушителю выполнить произвольный код

suse-cvrf
около 3 лет назад

Security update for nbd

EPSS

Процентиль: 62%
0.00436
Низкий